US20090072946A1 - Collaborative product authentication - Google Patents
Collaborative product authentication Download PDFInfo
- Publication number
- US20090072946A1 US20090072946A1 US11/855,797 US85579707A US2009072946A1 US 20090072946 A1 US20090072946 A1 US 20090072946A1 US 85579707 A US85579707 A US 85579707A US 2009072946 A1 US2009072946 A1 US 2009072946A1
- Authority
- US
- United States
- Prior art keywords
- product
- keeper
- identification
- authentication information
- mobile device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
Definitions
- the disclosure relates to information retrieval.
- an identification of an RFID tag is received from a mobile device.
- a product associated with the identification is identified, and a keeper associated with the product is identified.
- the keeper is provided to the mobile device, and authentication information associated with the product is received from the mobile device.
- the authentication information is associated with the product and the keeper, and the authentication information is evaluated.
- an identification of an RFID tag is received from a mobile device.
- a product associated with the identification is identified, and a keeper associated with the product is identified.
- the keeper is provided to the mobile device, and a selection of the keeper is received from the mobile device.
- Authentication information associated with the product and the keeper is identified, and the authentication information is provided to the mobile device.
- an identification of an RFID tag associated with a product is received, and the identification is provided to a product authentication system.
- a keeper associated with the product based on the identification is received.
- a selection of authentication information associated with the product is received, and the authentication information associated with the product is provided to the product authentication system.
- an identification of an RFID tag associated with a product is received, and the identification is provided to a product authentication system.
- a keeper associated with the product based on the identification is received, and in response to receiving a selection of the keeper, authentication information associated with the product is received and displayed.
- FIG. 1 is a block diagram of an implementation of a product authentication system.
- FIG. 2 is a flow diagram of an example process for receiving authentication information associated with a product.
- FIG. 3 is a flow diagram of an example process for receiving authentication information associated with a product.
- FIG. 4 is a flow of an example process for providing authentication information associated with a product.
- FIG. 5 is a flow of an example process for providing authentication information associated with a product.
- FIG. 6 is a block diagram of an example implementation of the mobile device of FIG. 1 .
- FIG. 7 is a schematic diagram of an example computer system that can be utilized to implement the systems and methods described herein.
- FIG. 1 is a block diagram of an implementation of a collaborative authentication system 100 .
- a computer network 110 such as a local area network (LAN), wide area network (WAN), the Internet, or a combination thereof, connects a user 102 , a mobile device 104 , and a product authentication system 108 .
- the product authentication system 108 can, for example, be an identification engine.
- the identification engine can performs all the tasks of the authentication engine 108 .
- communities are determined through user 102 contribution and benefit from the communities.
- the users 102 authenticate products 106 based on their knowledge about a particular product.
- users 102 receive the authentication information about products 106 that was provided by the users 102 previously.
- the collaborative authentication system 100 can gather information from one or more users 102 regarding the authenticity of products 106 .
- the information can be stored and used by others users 102 when determining whether a product 106 is counterfeit or genuine.
- one or more users 102 can determine whether a product 106 is genuine or counterfeit using the collaborative authentication system 100 .
- the mobile device 104 can be, for example, be a handheld computer, a personal digital assistant, a cellular telephone, a camera, a smart phone, a media player, a navigation device, an email device, a game console, or a combination of these data processing devices or other data processing devices.
- the mobile device 104 can also include one or more wireless communication subsystems, such as an 802.11b/g communication device, and/or a BluetoothTM communication device.
- Other communication protocols can also be supported, including other 802.x communication protocols (e.g., WiMax, Wi-Fi), code division multiple access (CDMA), W-CDMA or UMTS (3G), global system for mobile communications (GSM), Enhanced Data GSM Environment (EDGE), etc.
- An example implementation of the mobile device 104 is shown in FIG. 6 .
- the mobile device 104 can, for example, communicate over one or more wired and/or wireless networks 110 in data communication.
- the mobile device 104 may include circuitry and sensors for user as a radio frequency identification (FRID) reader.
- RFID is an automatic identification method, relying on storing and retrieving data through a wireless connection data using devices called RFID tags or transponders.
- An RFID tag includes integrated circuitry and antennas configured to receive and transmit data to radio frequency queries from an RFID transceiver such as, for example, an RFID reader or scanner.
- the integrated circuitry may be configured to transmit identification data responsive to a query from a reader device.
- the RFID reader can be configured to communicate with the system 108 to transmit data.
- RFID tags may be attached for purposes of tracking and identification.
- Each of the products 106 can for example, be attached with an RFID tag.
- the RFID tag can be programmed with a unique identification code. Additionally, this identification code can be used by the system 108 and the mobile device 104 to identify the product 106 .
- the RFID tags are configured to wirelessly receive a query from the mobile device 104 (RFID reader) and to transmit data in response to the query.
- the data can include the unique identification code or other identification information such as, for example, product type, serial number, quantity, access level, etc.
- the mobile device 104 synchronizes with the system 108 to determine the identification information associated with the unique identification code.
- the authentication is related to a certain “keeper.”
- the keeper could be a store that sells the product or generally anybody who was keeping the product when it was authenticated by the user 102 . This information can be used to warn users, e.g., end-consumers, of certain sellers of counterfeit goods. The detailed processes of contributing to and benefiting from the community are set forth below.
- a user 102 can contribute to a community.
- a user 102 can for example, be in possession of a product 106 .
- the user 102 can be at a merchant shopping for one or more products 106 .
- the user 102 can scan the RFID tag of the product 106 using a mobile device 104 .
- the scanned RFID tag can, for example, be associated with a certain type of product 106 .
- the mobile device 104 can identify the product 106 based on an identification of the RFID tag.
- the mobile device 104 can, for example, store a list of products with associated RFID tags.
- the mobile device 104 can determine the specific product the user 102 has scanned with the mobile device 104 by comparing the identification of the RFID tag with the list of products and associated RFID tags.
- the mobile device 104 can send the identified product 106 to the product authentication system 108 .
- the mobile device 102 can send a product identification associated with the product to the product authentication system.
- the mobile device 104 can send the identification of the RFID tag to the product authentication system 108 .
- the mobile device 104 can send a tuple of data to the product authentication system.
- the tuple can, for example, include a product identification, keeper identification, user identification, and timestamp.
- the product identification can include a name of the product.
- the keeper identification can include the name of the keeper or a unique number associated with the keeper.
- the user identification can include a unique number associated with the user, for example, a social security number, or a number selected by the user.
- the timestamp can include the time the mobile device 104 scanned the product.
- the product authentication system 108 can identify the product 106 based on the data received from the mobile device 104 .
- the product authentication system 104 can, for example, identify the product based on the identification of the RFID tag.
- the product authentication system 108 can, for example, store the list of products with associated identifications of RFID tags.
- the product authentication system 108 can identify the product by comparing the identification of the RFID tag with the list of products and associated identification of RFID tags.
- the mobile device 104 can query the product authentication system 108 for assigned keepers for the identified product 106 .
- a keeper can, for example, be a store that sells the product 106 or generally anybody who was keeping the product 106 when it was authenticated by the user 102 .
- the mobile device 104 can, for example, query the product authentication system 108 for all keepers that are associated with the identified product 106 .
- the product authentication system 108 can compare the identified product with a stored list of keepers and products either sold or associated with the keepers. The system 108 can, therefore, compare the identified product with the list to identify all the keepers associated with the identified product.
- the product authentication system 108 can provide a list of one or more keepers associated with the identified product 106 .
- the product authentication system 108 can, for example, store a list of products and associated keepers.
- a product can, for example, be associated with one or more keepers.
- the product authentication system 108 can provide the keepers to the mobile device 104 .
- the mobile device 104 can receive the keepers associated with the product 106 , and the keepers can be presented to the user 102 .
- the user 102 can, for example, either select one of the keepers form the list provided by the product authentication system 108 or the user 102 can enter a new keeper to associate with the product 106 .
- the user 102 can enter new keeper information using the mobile device 104 .
- the new keeper information can, for example, include the keeper name and location.
- the mobile device 104 can receive the selection of the keeper from the list, or the new keeper information from the user 102 . Having associated the product with the keeper of the product, the user 102 can enter the actual authentication information using the mobile device 104 .
- the authentication information can, for example, be associated with whether the product is counterfeit or genuine. If the user 102 determines the product is genuine, then the authentication information can reflect the product is genuine. If the user 102 determines the product is counterfeit, then the authentication information can reflect the product is counterfeit. In one implementation, authentication information can also include varying degrees associated with the authenticity of a product 106 . For example, the user 102 can select from a range of 1 to 10 when determining the authenticity of a product 106 , where 1 is a genuine product and 10 is counterfeit.
- the mobile device 104 can provide the authentication information received to the product authentication system 108 .
- the product authentication system 108 can receive the authentication information and can associate the authentication information with the product 106 in accordance with the user 102 authentication and the keeper selected by the user 102 . Therefore, the product authentication system 108 can associate for each keeper, the product associated with the keeper as well as the authentication information associated with the product located at the keeper.
- the product authentication system 108 can evaluate the authentication information. For example, the product authentication system 108 can evaluate the authentication information based on the status, or experience level, of the user 102 . If, for example, experience level of the user 102 reflects the user 102 is an expert user, the product authentication system 108 can rate the authentication information higher than if the user 102 was a beginner user. The experience level associated with the user 102 can, for example, depend on the number of time the user 102 has contributed authentication information to the collaborative authentication system 100 . In one implementation, the system 100 can associate an experience level with a user 102 prior to the user 102 contributing authentication information to the system.
- the product authentication system 108 can collect authentication information for one or more products 106 from one or more users 102 .
- the authentication information can be distributed to other users 102 upon inquiry about the authenticity of a product, as will be described below.
- a user A is shopping in a store A and selects a particular perfume.
- User A determines the perfume in store A is counterfeit.
- User A can scan the RFID tag of the perfume with his mobile device.
- the mobile device can identify the product based on the identification of the RFID tag.
- the mobile device can, for example, identify the perfume as perfume A based on the RFID tag.
- the mobile device can provide the product, perfume A, to the product authentication system in order to receive a list of one or more keepers associated with the product.
- the product authentication system can then provide the mobile device with a list of one or more keepers.
- the user 102 can scroll through the list of keepers to determine whether store A is one of the keepers.
- store A is not one of the keepers
- the user can add a new keeper to the list of keepers by entering the name of the keeper (store A) along with other information such as the location of the keeper using the mobile device. If store A is one of the keepers, the user can select the keeper (store A) from the list.
- the mobile device can then receive authentication information associated with perfume A from the user. The user can, for example, provide that perfume A is counterfeit.
- the mobile device can provide the authentication information associated with perfume A to the product authentication system.
- the product authentication system can store the information that perfume A is counterfeit at store A and provide the information to other users that inquire about perfume A at store A at a later time.
- a user 102 can determine the authenticity of a product using the collaborative authentication system 100 .
- the user 102 can, for example, scan the RFID tag of a product 106 with a mobile device 104 .
- the mobile device 104 can provide the identification of the RFID tag to the product authentication system 108 .
- the product authentication system 108 can identify the product the user 102 scanned.
- the product authentication system 108 can, for example, compare the identification of the RFID tag to a stored list of products with associated RFID tags. Based on the comparison, the product authentication system 108 can identify the product 106 .
- the product authentication system 108 when the product authentication system 108 receives the selection of the keeper associated with the identified product 106 , the product authentication system 108 can provide any authentication information stored associated with the identified product and the selected keeper to the mobile device 104 .
- the mobile device 104 can receive and display the authentication information associated with the product 106 .
- a user B in store A wants to determine the authenticity of perfume A.
- the user can scan the RFID tag of perfume A with a mobile device, and the mobile device can provide the identification of the RFID tag of perfume A to the product authentication system 108 .
- the product authentication system 108 can determine whether any previous users have provided authentication information associated with perfume A at store A. In this example, as described above, the user A provided that perfume A at store A was counterfeit. Therefore, the product authentication system 108 can provide the information received from user A to the mobile device of user B.
- the product authentication system 108 can provide all the information to the mobile device 104 .
- the product authentication system 108 can provide the number of users that had authenticated a product as genuine and the number of users that provided that the product was counterfeit.
- the product authentication system 108 can be implemented utilizing one or more computing devices that include memory devices storing processing instructions and processing devices for executing the processing instructions.
- An example computing system is shown and described with reference to FIG. 6 . Other implementations, however, can also be used.
- products tagged with bar codes can also be authenticated. Instead of an RFID tag, the products can be tagged with a bar code.
- the mobile device 104 can also be equipped to scan bar codes and transmit bar code information to the product authentication system 108 .
- FIG. 2 is a flow diagram of an example process 200 for receiving authentication information associated with a product.
- the process 200 can, for example, be implemented in a system such as the system 100 of FIG. 1 .
- Stage 202 receives an identification of an RFID tag from a mobile device.
- the product authentication system 108 can an identification of an RFID tag from a mobile device 104 .
- Stage 204 identifies a product associated with the identification.
- the product authentication system 108 can identify a product 106 associated with the identification.
- Stage 206 identifies a keeper associated with the product.
- the product authentication system 206 can identify a keeper associated with the product 106 .
- Stage 208 provides the keeper to the mobile device.
- the product authentication system 206 can provide the keeper to the mobile device 104 .
- Stage 210 receives authentication information associated with the product from the mobile device.
- the product authentication system 206 can receive authentication information associated with the product 106 from the mobile device 104 .
- Stage 212 associates the authentication information with the product and the keeper.
- the product authentication system 206 can associate the authentication information with the product 106 and the keeper.
- Stage 214 evaluates the authentication information.
- product authentication system 206 can evaluate the authentication information.
- FIG. 3 is a flow diagram of an example process 300 for receiving authentication information associated with a product.
- the process 300 can, for example, be implemented in a system such as the system 100 of FIG. 1 .
- Stage 302 receives an identification of an RFID tag from a mobile device.
- the product authentication system 108 can receive an identification of an RFID tag from a mobile device 104 .
- Stage 304 identifies a product associated with the identification.
- the product authentication system 108 can identify a product 106 associated with the identification.
- Stage 306 identifies a keeper associated with the product.
- the product authentication system 108 can identify a keeper associated with the product 106 .
- Stage 308 provides the keeper to the mobile device.
- the product authentication system 108 can provide the keeper to the mobile device 104 .
- Stage 310 receives a selection of the keeper from the mobile device.
- the product authentication system 108 can receive a selection of the keeper from the mobile device 104 .
- Stage 312 identifies authentication information associated with the product and the keeper.
- the product authentication system 108 can identify authentication information associated with the product 106 and the keeper.
- Stage 314 provides the authentication information to the mobile device.
- the product authentication system 108 can provide the authentication information to the mobile device 104 .
- FIG. 4 is a flow of an example process 400 for providing authentication information associated with a product.
- the process 400 can, for example, be implemented in a system such as the system 100 of FIG. 1 .
- Stage 402 receives an identification of an RFID tag associated with a product.
- the mobile device 104 can receive an identification of an RFID tag associated with a product 106 .
- Stage 404 provides the identification to a product identification system.
- the mobile device 104 can provide the identification to the product authentication system 108 .
- Stage 406 receives a keeper associated with the product based on the identification.
- the mobile device 104 can receive a keeper associated with the product 106 based on the identification.
- Stage 408 receives a selection of authentication information associated with the product in response to receiving the keeper.
- the mobile device 104 can receive a selection of authentication information associated with the product 106 in response to receiving the keeper.
- Stage 410 provides the authentication information associated with the product to the product authentication system.
- the mobile device 104 can provide the authentication information associated with the product 106 to the product authentication system 108 .
- FIG. 5 is a flow of an example process 500 for providing authentication information associated with a product.
- the process 500 can, for example, be implemented in a system such as the system 100 of FIG. 1 .
- Stage 502 receives an identification of an RFID tag associated with a product.
- the mobile device 104 can receive an identification of an RFID tag associated with a product 106 .
- Stage 504 provides the identification to a product authentication system.
- the mobile device 104 can provide the identification to a product authentication system 108 .
- Stage 506 receives a keeper associated with the product based on the identification.
- the mobile device 104 can receive a keeper associated with the product based on the identification.
- Stage 508 receives and displays authentication information associated with the product in response to receiving the selection of the keeper.
- the mobile device 104 can receive and display authentication information associated with the product in response to receiving the selection of the keeper.
- FIG. 6 is a block diagram 600 of an example implementation of the mobile device 104 of FIG. 1 .
- the mobile device 104 can include one or more data processors, image processors and/or central processing units 602 , a memory interface 604 , and a peripherals interface 606 .
- the one or more processors 602 , the memory interface 604 , and/or the peripherals interface 606 can be separate components or can be integrated in one or more integrated circuits.
- the various components in the mobile device 104 can be coupled by one or more communication buses or signal lines.
- Sensors, devices and subsystems can be coupled to the peripherals interface 606 to facilitate multiple functionalities. Communication functions can be facilitated with one or more wireless communication subsystems 608 , which can include radio frequency receivers and transmitters and/or optical (e.g., infrared) receivers and transmitters.
- the specific design and implementation of the communication subsystem 608 can depend on the communication network(s) over which the mobile device 104 is intended to operate.
- a mobile device 104 may include communication subsystems 608 designed to operate over a GSM network, a GPRS network, a Wi-Fi or WiMax network, and a BluetoothTM network.
- An audio subsystem 610 can be coupled to a speaker and a microphone to facilitate voice-enable functions, such as telephony functions.
- the I/O subsystem 612 can include input controller(s) 614 .
- the input controller(s) 614 can be coupled to input/control devices 616 , such as one or more buttons, a touch screen, infrared port, USB port, a bar code reader, an RFID reader, and/or a pointer device such as a stylus.
- the memory interface 604 can be coupled to memory 650 .
- the memory 650 can include high-speed random access memory and/or non-volatile memory, such as one or more optical storage devices, one or more magnetic disk storage devices, and/or flash memory.
- the memory 350 can store an operating system 652 , such as LINUX, RTXC, UNIX, OS X, or WINDOWS.
- the operating system 652 may include instructions for handling basic system services and for performing hardware dependent tasks.
- the memory 650 may also store communication instructions 654 to facilitate communicating with one or more additional devices, one or more computers and/or one or more servers.
- the memory 650 may include graphical user interface instructions 656 to facilitate graphic user interface processing, phone instructions 658 to facilitate phone-related processes and functions, and RFID/bar code instructions 660 to facilitate RFID and bar code related processes and instructions.
- Each of the above identified applications and instructions can correspond to a set of instructions for performing one or more functions described above. These instructions need not be implemented as separate procedures, software programs, or modules.
- the memory 650 can include additional instructions or fewer instructions.
- various functions of the mobile device 104 may be implemented in hardware and/or in software, including in one or more application specific integrated circuits and/or signal processing.
- FIG. 7 is a block diagram illustrating the internal architecture of an example computer system.
- the computing environment includes a computer central processing unit (“CPU”) 701 where the computer instructions that comprise an operating system or an application are processed; a display interface 702 which provides a communication interface and processing functions for rendering graphics, images, and texts on a display monitor; a keyboard interface 704 which provides a communication interface to a keyboard; a pointing device interface 705 which provides a communication interface to a mouse or an equivalent pointing device; a digital input interface 706 which provides a communication interface to a video and audio detector; a hardcopy output device interface 708 which provides a communication interface to a hardcopy output device; a random access memory (“RAM”) 710 where computer instructions and data are stored in a volatile memory device for processing by the computer CPU 701 ; a read-only memory (“ROM”) 711 where invariant low-level systems code or data for basic system functions such as basic input and output (“I/O”), startup, or reception of keystrokes from a keyboard are stored in
- RAM random-access memory
- ROM read-only memory
- PROM programmable read-only memory
- EPROM erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- magnetic disks optical disks, floppy disks, hard disks, removable cartridges, flash drives
- application programs 722 including web browser application 723 , product engine 724 , and other applications 725 as necessary
- data files 726 are stored
- a computer network interface 716 which provides a communication interface to a network over a computer network connection.
- the constituent devices and the computer CPU 701 communicate with each other over the computer bus 727 .
- the RAM 710 interfaces with the computer bus 727 so as to provide quick RAM storage to the computer CPU 701 during the execution of software programs such as the operating system application programs, and device drivers. More specifically, the computer CPU 701 loads computer-executable process steps from fixed disk drives or other media into a field of the RAM 710 in order to execute software programs. Data is stored in the RAM 710 , where the data is accessed by the computer CPU 701 during execution.
- the product authentication system 108 can stores computer-executable code for an operating system 721 , and application programs 722 such as word processing, spreadsheet, presentation, gaming, web browsing, JavaScript engine, or other applications.
- application programs 722 such as word processing, spreadsheet, presentation, gaming, web browsing, JavaScript engine, or other applications.
- the computer CPU 701 is one of a number of high-performance computer processors, including an INTEL or AMD processor, a POWERPC processor, a MIPS reduced instruction set computer (“RISC”) processor, a SPARC processor, an ACORN RISC Machine (“ARM”) architecture processor, a HP ALPHASERVER processor or a proprietary computer processor for a mainframe.
- the computer CPU 701 is more than one processing unit, including a multiple CPU configuration found in high-performance workstations and servers, or a multiple scalable processing unit found in mainframes.
- the operating system 1721 may be APPLE MAC OS X for INTEL and POWERPC based workstations and servers; MICROSOFTWINDOWS NT®/WINDOWS 2000/WINDOWS XP Workstation; MICROSOFTWINDOWS VISTA/WINDOWS NT/WINDOWS 2000/WINDOWS XP Server; a variety of UNIX-flavored operating systems, including AIX for IBM workstations and servers, SUNOS for SUN workstations and servers, LINUX for INTEL CPU-based workstations and servers, HP UX WORKLOAD MANAGER for HP workstations and servers, IRIX for SGI workstations and servers, VAX/VMS for Digital Equipment Corporation computers, OPENVMS for HP ALPHASERVER-based computers; SYMBIAN OS, NEWTON, IPOD, WINDOWS MOBILE or WINDOWS CE, PALM, NOKIA OS (“NOS”), OSE, or EPOC for mobile devices, or a proprietary operating system for computers or embedded systems
- the application development platform or framework for the operating system 1721 may be: BINARY RUNTIME ENVIRONMENT FOR WIRELESS (“BREW”); Java Platform, Micro Edition (“Java ME”) or Java 2 Platform, Micro Edition (“J2ME”); PYTHONTM, FLASH LITE, or MICROSOFT .NET Compact.
- BREW BINARY RUNTIME ENVIRONMENT FOR WIRELESS
- Java ME Java Platform, Micro Edition
- J2ME Java 2 Platform, Micro Edition
- PYTHONTM FLASH LITE
- MICROSOFT .NET Compact MICROSOFT .NET Compact.
- FIG. 7 illustrates one possible implementation of a computing system that executes program code, or program or process steps, configured to effectuate product authentication
- other types of computers may also be used as well.
- selection is intended to denote throughout a manual selection by a human, an automatic selection by a non-human, or some combination thereof.
- JavaScript is intended to reference the SUN MICROSYSTEMS JAVASCRIPT programming language
- XML is intended to reference ‘eXtensible Markup Language’ throughout.
Abstract
An identification of an RFID tag is received from a mobile device. A product associated with the identification is identified, and a keeper associated with the product is identified. The keeper is provided to the mobile device, and a selection of the keeper is received from the mobile device. Authentication information associated with the product and the keeper is identified, and the authentication information is provided to the mobile device.
Description
- The disclosure relates to information retrieval.
- With the globalization of production and trade, counterfeiting of products has become a serious problem. Product authentication plays an important role in the fight against counterfeiting. Product authentication denotes the verification of the identity an object claims to have, i.e., it gives an answer (yes/no) to the question if a product is genuine or counterfeit. There are currently a range of approaches to authenticate products. They comprise direct authentication, authentication based on difficult to reproducible features, verification of unique identifiers, plausibility checks of track, and secure object authentication.
- Disclosed herein are systems, apparatus and methods for authenticating a product. In one implementation, an identification of an RFID tag is received from a mobile device. A product associated with the identification is identified, and a keeper associated with the product is identified. The keeper is provided to the mobile device, and authentication information associated with the product is received from the mobile device. The authentication information is associated with the product and the keeper, and the authentication information is evaluated.
- In another implementation, an identification of an RFID tag is received from a mobile device. A product associated with the identification is identified, and a keeper associated with the product is identified. The keeper is provided to the mobile device, and a selection of the keeper is received from the mobile device. Authentication information associated with the product and the keeper is identified, and the authentication information is provided to the mobile device.
- In another implementation, an identification of an RFID tag associated with a product is received, and the identification is provided to a product authentication system. A keeper associated with the product based on the identification is received. In response to receiving the keeper, a selection of authentication information associated with the product is received, and the authentication information associated with the product is provided to the product authentication system.
- In another implementation, an identification of an RFID tag associated with a product is received, and the identification is provided to a product authentication system. A keeper associated with the product based on the identification is received, and in response to receiving a selection of the keeper, authentication information associated with the product is received and displayed.
-
FIG. 1 is a block diagram of an implementation of a product authentication system. -
FIG. 2 is a flow diagram of an example process for receiving authentication information associated with a product. -
FIG. 3 is a flow diagram of an example process for receiving authentication information associated with a product. -
FIG. 4 is a flow of an example process for providing authentication information associated with a product. -
FIG. 5 is a flow of an example process for providing authentication information associated with a product. -
FIG. 6 is a block diagram of an example implementation of the mobile device ofFIG. 1 . -
FIG. 7 is a schematic diagram of an example computer system that can be utilized to implement the systems and methods described herein. - The drawbacks of the existing approaches in combination with the developments in technology lead to the demand for a new approach for product authentication. The advantages of communities and direct authentication through users, such as experts, are leveraged.
-
FIG. 1 is a block diagram of an implementation of acollaborative authentication system 100. Acomputer network 110, such as a local area network (LAN), wide area network (WAN), the Internet, or a combination thereof, connects auser 102, amobile device 104, and aproduct authentication system 108. Theproduct authentication system 108 can, for example, be an identification engine. The identification engine can performs all the tasks of theauthentication engine 108. - In one implementation, communities are determined through
user 102 contribution and benefit from the communities. Contributing to the community, theusers 102authenticate products 106 based on their knowledge about a particular product. Benefiting from the community,users 102 receive the authentication information aboutproducts 106 that was provided by theusers 102 previously. - In one implementation, the
collaborative authentication system 100 can gather information from one ormore users 102 regarding the authenticity ofproducts 106. The information can be stored and used byothers users 102 when determining whether aproduct 106 is counterfeit or genuine. In another implementation, one ormore users 102 can determine whether aproduct 106 is genuine or counterfeit using thecollaborative authentication system 100. - The
mobile device 104 can be, for example, be a handheld computer, a personal digital assistant, a cellular telephone, a camera, a smart phone, a media player, a navigation device, an email device, a game console, or a combination of these data processing devices or other data processing devices. Themobile device 104 can also include one or more wireless communication subsystems, such as an 802.11b/g communication device, and/or a Bluetooth™ communication device. Other communication protocols can also be supported, including other 802.x communication protocols (e.g., WiMax, Wi-Fi), code division multiple access (CDMA), W-CDMA or UMTS (3G), global system for mobile communications (GSM), Enhanced Data GSM Environment (EDGE), etc. An example implementation of themobile device 104 is shown inFIG. 6 . - The
mobile device 104 can, for example, communicate over one or more wired and/orwireless networks 110 in data communication. In some implementations, themobile device 104 may include circuitry and sensors for user as a radio frequency identification (FRID) reader. RFID is an automatic identification method, relying on storing and retrieving data through a wireless connection data using devices called RFID tags or transponders. An RFID tag includes integrated circuitry and antennas configured to receive and transmit data to radio frequency queries from an RFID transceiver such as, for example, an RFID reader or scanner. The integrated circuitry may be configured to transmit identification data responsive to a query from a reader device. The RFID reader can be configured to communicate with thesystem 108 to transmit data. - RFID tags may be attached for purposes of tracking and identification. Each of the
products 106, can for example, be attached with an RFID tag. The RFID tag can be programmed with a unique identification code. Additionally, this identification code can be used by thesystem 108 and themobile device 104 to identify theproduct 106. The RFID tags are configured to wirelessly receive a query from the mobile device 104 (RFID reader) and to transmit data in response to the query. The data can include the unique identification code or other identification information such as, for example, product type, serial number, quantity, access level, etc. In one implementation, in the case of the unique identification code, themobile device 104 synchronizes with thesystem 108 to determine the identification information associated with the unique identification code. - In one implementation, the authentication is related to a certain “keeper.” The keeper could be a store that sells the product or generally anybody who was keeping the product when it was authenticated by the
user 102. This information can be used to warn users, e.g., end-consumers, of certain sellers of counterfeit goods. The detailed processes of contributing to and benefiting from the community are set forth below. - In one implementation, a
user 102 can contribute to a community. Auser 102 can for example, be in possession of aproduct 106. For example, theuser 102 can be at a merchant shopping for one ormore products 106. Theuser 102 can scan the RFID tag of theproduct 106 using amobile device 104. The scanned RFID tag can, for example, be associated with a certain type ofproduct 106. - In one implementation, the
mobile device 104 can identify theproduct 106 based on an identification of the RFID tag. Themobile device 104 can, for example, store a list of products with associated RFID tags. Upon receiving an identification of the RFID tag of theproduct 106, themobile device 104 can determine the specific product theuser 102 has scanned with themobile device 104 by comparing the identification of the RFID tag with the list of products and associated RFID tags. Themobile device 104 can send the identifiedproduct 106 to theproduct authentication system 108. For example, themobile device 102 can send a product identification associated with the product to the product authentication system. - In another implementation, the
mobile device 104 can send the identification of the RFID tag to theproduct authentication system 108. Themobile device 104 can send a tuple of data to the product authentication system. The tuple can, for example, include a product identification, keeper identification, user identification, and timestamp. The product identification can include a name of the product. The keeper identification can include the name of the keeper or a unique number associated with the keeper. The user identification can include a unique number associated with the user, for example, a social security number, or a number selected by the user. The timestamp can include the time themobile device 104 scanned the product. - In one implementation, the
product authentication system 108 can identify theproduct 106 based on the data received from themobile device 104. Theproduct authentication system 104 can, for example, identify the product based on the identification of the RFID tag. Theproduct authentication system 108 can, for example, store the list of products with associated identifications of RFID tags. Upon receipt of the identification of the RFID tag of theproduct 106, theproduct authentication system 108 can identify the product by comparing the identification of the RFID tag with the list of products and associated identification of RFID tags. - In one implementation, the
mobile device 104 can query theproduct authentication system 108 for assigned keepers for the identifiedproduct 106. A keeper can, for example, be a store that sells theproduct 106 or generally anybody who was keeping theproduct 106 when it was authenticated by theuser 102. Themobile device 104 can, for example, query theproduct authentication system 108 for all keepers that are associated with the identifiedproduct 106. - In one implementation, the
product authentication system 108 can compare the identified product with a stored list of keepers and products either sold or associated with the keepers. Thesystem 108 can, therefore, compare the identified product with the list to identify all the keepers associated with the identified product. Theproduct authentication system 108 can provide a list of one or more keepers associated with the identifiedproduct 106. Theproduct authentication system 108 can, for example, store a list of products and associated keepers. A product can, for example, be associated with one or more keepers. Theproduct authentication system 108 can provide the keepers to themobile device 104. - In one implementation, the
mobile device 104 can receive the keepers associated with theproduct 106, and the keepers can be presented to theuser 102. Theuser 102 can, for example, either select one of the keepers form the list provided by theproduct authentication system 108 or theuser 102 can enter a new keeper to associate with theproduct 106. For example, if the keeper that theproduct 106 is located at is not in the list of keepers, theuser 102 can enter new keeper information using themobile device 104. The new keeper information can, for example, include the keeper name and location. Themobile device 104 can receive the selection of the keeper from the list, or the new keeper information from theuser 102. Having associated the product with the keeper of the product, theuser 102 can enter the actual authentication information using themobile device 104. - The authentication information can, for example, be associated with whether the product is counterfeit or genuine. If the
user 102 determines the product is genuine, then the authentication information can reflect the product is genuine. If theuser 102 determines the product is counterfeit, then the authentication information can reflect the product is counterfeit. In one implementation, authentication information can also include varying degrees associated with the authenticity of aproduct 106. For example, theuser 102 can select from a range of 1 to 10 when determining the authenticity of aproduct 106, where 1 is a genuine product and 10 is counterfeit. - In one implementation, the
mobile device 104 can provide the authentication information received to theproduct authentication system 108. Theproduct authentication system 108 can receive the authentication information and can associate the authentication information with theproduct 106 in accordance with theuser 102 authentication and the keeper selected by theuser 102. Therefore, theproduct authentication system 108 can associate for each keeper, the product associated with the keeper as well as the authentication information associated with the product located at the keeper. - In one implementation, the
product authentication system 108 can evaluate the authentication information. For example, theproduct authentication system 108 can evaluate the authentication information based on the status, or experience level, of theuser 102. If, for example, experience level of theuser 102 reflects theuser 102 is an expert user, theproduct authentication system 108 can rate the authentication information higher than if theuser 102 was a beginner user. The experience level associated with theuser 102 can, for example, depend on the number of time theuser 102 has contributed authentication information to thecollaborative authentication system 100. In one implementation, thesystem 100 can associate an experience level with auser 102 prior to theuser 102 contributing authentication information to the system. - In one implementation, the
product authentication system 108 can collect authentication information for one ormore products 106 from one ormore users 102. The authentication information can be distributed toother users 102 upon inquiry about the authenticity of a product, as will be described below. - For example, suppose a user A is shopping in a store A and selects a particular perfume. User A determines the perfume in store A is counterfeit. User A can scan the RFID tag of the perfume with his mobile device. The mobile device can identify the product based on the identification of the RFID tag. The mobile device can, for example, identify the perfume as perfume A based on the RFID tag. The mobile device can provide the product, perfume A, to the product authentication system in order to receive a list of one or more keepers associated with the product. The product authentication system can then provide the mobile device with a list of one or more keepers. The
user 102 can scroll through the list of keepers to determine whether store A is one of the keepers. If store A is not one of the keepers, the user can add a new keeper to the list of keepers by entering the name of the keeper (store A) along with other information such as the location of the keeper using the mobile device. If store A is one of the keepers, the user can select the keeper (store A) from the list. The mobile device can then receive authentication information associated with perfume A from the user. The user can, for example, provide that perfume A is counterfeit. The mobile device can provide the authentication information associated with perfume A to the product authentication system. The product authentication system can store the information that perfume A is counterfeit at store A and provide the information to other users that inquire about perfume A at store A at a later time. - In one implementation, a
user 102 can determine the authenticity of a product using thecollaborative authentication system 100. Theuser 102 can, for example, scan the RFID tag of aproduct 106 with amobile device 104. Themobile device 104 can provide the identification of the RFID tag to theproduct authentication system 108. Based on the identification, theproduct authentication system 108 can identify the product theuser 102 scanned. Theproduct authentication system 108 can, for example, compare the identification of the RFID tag to a stored list of products with associated RFID tags. Based on the comparison, theproduct authentication system 108 can identify theproduct 106. - In one implementation, when the
product authentication system 108 receives the selection of the keeper associated with the identifiedproduct 106, theproduct authentication system 108 can provide any authentication information stored associated with the identified product and the selected keeper to themobile device 104. Themobile device 104 can receive and display the authentication information associated with theproduct 106. - In another example, suppose a user B in store A wants to determine the authenticity of perfume A. The user can scan the RFID tag of perfume A with a mobile device, and the mobile device can provide the identification of the RFID tag of perfume A to the
product authentication system 108. Theproduct authentication system 108 can determine whether any previous users have provided authentication information associated with perfume A at store A. In this example, as described above, the user A provided that perfume A at store A was counterfeit. Therefore, theproduct authentication system 108 can provide the information received from user A to the mobile device of user B. - In one implementation, if conflicting authentication information is received for a product, the
product authentication system 108 can provide all the information to themobile device 104. For example, theproduct authentication system 108 can provide the number of users that had authenticated a product as genuine and the number of users that provided that the product was counterfeit. - The
product authentication system 108 can be implemented utilizing one or more computing devices that include memory devices storing processing instructions and processing devices for executing the processing instructions. An example computing system is shown and described with reference toFIG. 6 . Other implementations, however, can also be used. - While the above implementations refer to products tagged with RFID, products tagged with bar codes can also be authenticated. Instead of an RFID tag, the products can be tagged with a bar code. The
mobile device 104 can also be equipped to scan bar codes and transmit bar code information to theproduct authentication system 108. -
FIG. 2 is a flow diagram of anexample process 200 for receiving authentication information associated with a product. Theprocess 200 can, for example, be implemented in a system such as thesystem 100 ofFIG. 1 . -
Stage 202 receives an identification of an RFID tag from a mobile device. For example, theproduct authentication system 108 can an identification of an RFID tag from amobile device 104. -
Stage 204 identifies a product associated with the identification. For example, theproduct authentication system 108 can identify aproduct 106 associated with the identification. -
Stage 206 identifies a keeper associated with the product. For example, theproduct authentication system 206 can identify a keeper associated with theproduct 106. -
Stage 208 provides the keeper to the mobile device. For example, theproduct authentication system 206 can provide the keeper to themobile device 104. -
Stage 210 receives authentication information associated with the product from the mobile device. For example, theproduct authentication system 206 can receive authentication information associated with theproduct 106 from themobile device 104. -
Stage 212 associates the authentication information with the product and the keeper. For example, theproduct authentication system 206 can associate the authentication information with theproduct 106 and the keeper. -
Stage 214 evaluates the authentication information. For example,product authentication system 206 can evaluate the authentication information. -
FIG. 3 is a flow diagram of anexample process 300 for receiving authentication information associated with a product. Theprocess 300 can, for example, be implemented in a system such as thesystem 100 ofFIG. 1 . -
Stage 302 receives an identification of an RFID tag from a mobile device. For example, theproduct authentication system 108 can receive an identification of an RFID tag from amobile device 104. -
Stage 304 identifies a product associated with the identification. For example, theproduct authentication system 108 can identify aproduct 106 associated with the identification. -
Stage 306 identifies a keeper associated with the product. For example, theproduct authentication system 108 can identify a keeper associated with theproduct 106. -
Stage 308 provides the keeper to the mobile device. For example, theproduct authentication system 108 can provide the keeper to themobile device 104. -
Stage 310 receives a selection of the keeper from the mobile device. For example, theproduct authentication system 108 can receive a selection of the keeper from themobile device 104. -
Stage 312 identifies authentication information associated with the product and the keeper. For example, theproduct authentication system 108 can identify authentication information associated with theproduct 106 and the keeper. -
Stage 314 provides the authentication information to the mobile device. For example, theproduct authentication system 108 can provide the authentication information to themobile device 104. -
FIG. 4 is a flow of anexample process 400 for providing authentication information associated with a product. Theprocess 400 can, for example, be implemented in a system such as thesystem 100 ofFIG. 1 . -
Stage 402 receives an identification of an RFID tag associated with a product. For example, themobile device 104 can receive an identification of an RFID tag associated with aproduct 106. -
Stage 404 provides the identification to a product identification system. For example, themobile device 104 can provide the identification to theproduct authentication system 108. -
Stage 406 receives a keeper associated with the product based on the identification. For example, themobile device 104 can receive a keeper associated with theproduct 106 based on the identification. -
Stage 408 receives a selection of authentication information associated with the product in response to receiving the keeper. For example, themobile device 104 can receive a selection of authentication information associated with theproduct 106 in response to receiving the keeper. -
Stage 410 provides the authentication information associated with the product to the product authentication system. For example, themobile device 104 can provide the authentication information associated with theproduct 106 to theproduct authentication system 108. -
FIG. 5 is a flow of anexample process 500 for providing authentication information associated with a product. Theprocess 500 can, for example, be implemented in a system such as thesystem 100 ofFIG. 1 . -
Stage 502 receives an identification of an RFID tag associated with a product. For example, themobile device 104 can receive an identification of an RFID tag associated with aproduct 106. -
Stage 504 provides the identification to a product authentication system. For example, themobile device 104 can provide the identification to aproduct authentication system 108. -
Stage 506 receives a keeper associated with the product based on the identification. For example, themobile device 104 can receive a keeper associated with the product based on the identification. -
Stage 508 receives and displays authentication information associated with the product in response to receiving the selection of the keeper. For example, themobile device 104 can receive and display authentication information associated with the product in response to receiving the selection of the keeper. -
FIG. 6 is a block diagram 600 of an example implementation of themobile device 104 ofFIG. 1 . Themobile device 104 can include one or more data processors, image processors and/orcentral processing units 602, amemory interface 604, and aperipherals interface 606. The one ormore processors 602, thememory interface 604, and/or the peripherals interface 606 can be separate components or can be integrated in one or more integrated circuits. The various components in themobile device 104 can be coupled by one or more communication buses or signal lines. - Sensors, devices and subsystems can be coupled to the peripherals interface 606 to facilitate multiple functionalities. Communication functions can be facilitated with one or more
wireless communication subsystems 608, which can include radio frequency receivers and transmitters and/or optical (e.g., infrared) receivers and transmitters. The specific design and implementation of thecommunication subsystem 608 can depend on the communication network(s) over which themobile device 104 is intended to operate. For example, amobile device 104 may includecommunication subsystems 608 designed to operate over a GSM network, a GPRS network, a Wi-Fi or WiMax network, and a Bluetooth™ network. - An
audio subsystem 610 can be coupled to a speaker and a microphone to facilitate voice-enable functions, such as telephony functions. The I/O subsystem 612 can include input controller(s) 614. The input controller(s) 614 can be coupled to input/control devices 616, such as one or more buttons, a touch screen, infrared port, USB port, a bar code reader, an RFID reader, and/or a pointer device such as a stylus. - The
memory interface 604 can be coupled tomemory 650. Thememory 650 can include high-speed random access memory and/or non-volatile memory, such as one or more optical storage devices, one or more magnetic disk storage devices, and/or flash memory. The memory 350 can store anoperating system 652, such as LINUX, RTXC, UNIX, OS X, or WINDOWS. Theoperating system 652 may include instructions for handling basic system services and for performing hardware dependent tasks. - The
memory 650 may also storecommunication instructions 654 to facilitate communicating with one or more additional devices, one or more computers and/or one or more servers. Thememory 650 may include graphicaluser interface instructions 656 to facilitate graphic user interface processing,phone instructions 658 to facilitate phone-related processes and functions, and RFID/bar code instructions 660 to facilitate RFID and bar code related processes and instructions. - Each of the above identified applications and instructions can correspond to a set of instructions for performing one or more functions described above. These instructions need not be implemented as separate procedures, software programs, or modules. The
memory 650 can include additional instructions or fewer instructions. Furthermore, various functions of themobile device 104 may be implemented in hardware and/or in software, including in one or more application specific integrated circuits and/or signal processing. -
FIG. 7 is a block diagram illustrating the internal architecture of an example computer system. The computing environment includes a computer central processing unit (“CPU”) 701 where the computer instructions that comprise an operating system or an application are processed; a display interface 702 which provides a communication interface and processing functions for rendering graphics, images, and texts on a display monitor; a keyboard interface 704 which provides a communication interface to a keyboard; a pointing device interface 705 which provides a communication interface to a mouse or an equivalent pointing device; a digital input interface 706 which provides a communication interface to a video and audio detector; a hardcopy output device interface 708 which provides a communication interface to a hardcopy output device; a random access memory (“RAM”) 710 where computer instructions and data are stored in a volatile memory device for processing by the computer CPU 701; a read-only memory (“ROM”) 711 where invariant low-level systems code or data for basic system functions such as basic input and output (“I/O”), startup, or reception of keystrokes from a keyboard are stored in a non-volatile memory device; a storage 720 or other suitable type of memory (e.g. such as random-access memory (“RAM”), read-only memory (“ROM”), programmable read-only memory (“PROM”), erasable programmable read-only memory (“EPROM”), electrically erasable programmable read-only memory (“EEPROM”), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives), where the files that comprise an operating system 1721, application programs 722 (including web browser application 723, product engine 724, and other applications 725 as necessary) and data files 726 are stored; and a computer network interface 716 which provides a communication interface to a network over a computer network connection. The constituent devices and thecomputer CPU 701 communicate with each other over thecomputer bus 727. - The
RAM 710 interfaces with thecomputer bus 727 so as to provide quick RAM storage to thecomputer CPU 701 during the execution of software programs such as the operating system application programs, and device drivers. More specifically, thecomputer CPU 701 loads computer-executable process steps from fixed disk drives or other media into a field of theRAM 710 in order to execute software programs. Data is stored in theRAM 710, where the data is accessed by thecomputer CPU 701 during execution. - Also shown in
FIG. 7 , theproduct authentication system 108 can stores computer-executable code for anoperating system 721, andapplication programs 722 such as word processing, spreadsheet, presentation, gaming, web browsing, JavaScript engine, or other applications. - The
computer CPU 701 is one of a number of high-performance computer processors, including an INTEL or AMD processor, a POWERPC processor, a MIPS reduced instruction set computer (“RISC”) processor, a SPARC processor, an ACORN RISC Machine (“ARM”) architecture processor, a HP ALPHASERVER processor or a proprietary computer processor for a mainframe. In an additional arrangement, thecomputer CPU 701 is more than one processing unit, including a multiple CPU configuration found in high-performance workstations and servers, or a multiple scalable processing unit found in mainframes. - The operating system 1721 may be APPLE MAC OS X for INTEL and POWERPC based workstations and servers; MICROSOFTWINDOWS NT®/WINDOWS 2000/WINDOWS XP Workstation; MICROSOFTWINDOWS VISTA/WINDOWS NT/WINDOWS 2000/WINDOWS XP Server; a variety of UNIX-flavored operating systems, including AIX for IBM workstations and servers, SUNOS for SUN workstations and servers, LINUX for INTEL CPU-based workstations and servers, HP UX WORKLOAD MANAGER for HP workstations and servers, IRIX for SGI workstations and servers, VAX/VMS for Digital Equipment Corporation computers, OPENVMS for HP ALPHASERVER-based computers; SYMBIAN OS, NEWTON, IPOD, WINDOWS MOBILE or WINDOWS CE, PALM, NOKIA OS (“NOS”), OSE, or EPOC for mobile devices, or a proprietary operating system for computers or embedded systems. The application development platform or framework for the operating system 1721 may be: BINARY RUNTIME ENVIRONMENT FOR WIRELESS (“BREW”); Java Platform, Micro Edition (“Java ME”) or Java 2 Platform, Micro Edition (“J2ME”); PYTHON™, FLASH LITE, or MICROSOFT .NET Compact.
- While
FIG. 7 illustrates one possible implementation of a computing system that executes program code, or program or process steps, configured to effectuate product authentication, other types of computers may also be used as well. - While the term “user” has been consistently used to describe an entity that interacts with these processes, such a generalization is also intended to describe multiple related or unrelated, living or automated entities or beings that interact with these processes at various different, overlapping or non-overlapping states. In a similar vein, the term “selection” is intended to denote throughout a manual selection by a human, an automatic selection by a non-human, or some combination thereof.
- Finally, it is noted that, for the sake of brevity, the term “JavaScript” is intended to reference the SUN MICROSYSTEMS JAVASCRIPT programming language, and the term “XML” is intended to reference ‘eXtensible Markup Language’ throughout.
- A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the disclosure. Accordingly, other implementations are within the scope of the following claims.
Claims (19)
1. A computer-implemented method, comprising:
receiving an identification of an RFID tag from a mobile device;
identifying a product associated with the identification;
identifying a keeper associated with the product;
providing the keeper to the mobile device;
receiving authentication information associated with the product from the mobile device, wherein the authentication information includes whether the product is genuine or counterfeit;
associating the authentication information with the product and the keeper; and
evaluating the authentication information.
2. The method of claim 1 , wherein the identification of an RFID tag is received by a scan of the RFID tag by the mobile device.
3. The method of claim 1 , wherein the keeper is one of a merchant that sells the product or a merchant that stores the product.
4. The method of claim 1 , wherein evaluating the authentication information comprises:
rating the authentication information based on an experience level associated with a user.
5. The method of claim 1 , further comprising:
receiving the authentication information associated with the product from one or more users; and
collecting the authentication information from the one or more users.
6. A computer-implemented method, comprising:
receiving an identification of an RFID tag from a mobile device, wherein the identification of an RFID tag is received by a scan of the RFID tag by the mobile device;
identifying a product associated with the identification;
identifying a keeper associated with the product;
providing the keeper to the mobile device;
receiving a selection of the keeper from the mobile device;
identifying authentication information associated with the product and the keeper; and
providing the authentication information to the mobile device.
7. The method of claim 6 , wherein the keeper is one of a merchant that sells the product or a merchant that stores the product.
8. The method of claim 6 , wherein the authentication information includes whether the product is genuine or counterfeit.
9. The method of claim 6 , wherein receiving a selection of the keeper from the mobile device comprises:
receiving confirmation that the keeper is associated with the product.
10. The method of claim 6 , wherein identifying authentication information associated with the product and the keeper comprises:
identifying the authentication information based on previously collected authentication information associated with the product and the keeper.
11. A computer-implemented method, comprising:
receiving an identification of an RFID tag associated with a product;
providing the identification to a product authentication system;
receiving a keeper associated with the product based on the identification, wherein the keeper is one of a merchant that sells the product or a merchant that stores the product;
in response to receiving the keeper, receiving a selection of authentication information associated with the product; and
providing the authentication information associated with the product to the product authentication system.
12. The method of claim 11 , wherein receiving the identification of the RFID tag associated with the product comprises:
scanning the identification of the RFID tag associated with the product.
13. The method of claim 11 , wherein the identification of an RFID tag is received by a scan of the RFID tag by the mobile device.
14. The method of claim 11 , wherein the authentication information includes whether the product is genuine or counterfeit.
15. A computer-implemented method, comprising:
receiving an identification of an RFID tag associated with a product;
providing the identification to a product authentication system;
receiving a keeper associated with the product based on the identification; and
in response to receiving a selection of the keeper, receiving and displaying authentication information associated with the product.
16. The method of claim 15 , wherein receiving the identification of the RFID tag associated with the product comprises:
scanning the identification of the RFID tag associated with the product.
17. The method of claim 15 , wherein the keeper is one of a merchant that sells the product or a merchant that stores the product.
18. The method of claim 15 , wherein the authentication information includes whether the product is genuine or counterfeit.
19. A system, comprising:
a mobile device that receives an identification of an RFID tag associated with a product, provides the identification to an identification engine, receives a keeper associated with the product based on the identification, and in response to receiving the keeper, receives a selection of authentication information associated with the product, and provides the authentication information associated with the product to the product authentication engine; and
an identification engine that receives the identification, identifies the keeper associated with the product, provides the keeper to the mobile device, receives the authentication information associated with the product from the mobile device, associates the authentication information with the product and the keeper, and evaluates the authentication information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/855,797 US20090072946A1 (en) | 2007-09-14 | 2007-09-14 | Collaborative product authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/855,797 US20090072946A1 (en) | 2007-09-14 | 2007-09-14 | Collaborative product authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090072946A1 true US20090072946A1 (en) | 2009-03-19 |
Family
ID=40453843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/855,797 Abandoned US20090072946A1 (en) | 2007-09-14 | 2007-09-14 | Collaborative product authentication |
Country Status (1)
Country | Link |
---|---|
US (1) | US20090072946A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100174661A1 (en) * | 2008-12-02 | 2010-07-08 | Qualcomm Incorporated | Wireless Branding |
US20100306112A1 (en) * | 2009-06-01 | 2010-12-02 | Userstar Information System Co., Ltd. | Online trading method and system with mechanism for verifying authenticity of a product |
US20130047232A1 (en) * | 2011-08-18 | 2013-02-21 | Teletech Holdings, Inc. | Multiple authentication mechanisms for accessing service center supporting a variety of products |
CN104021475A (en) * | 2013-03-24 | 2014-09-03 | 张力 | Commodity cloud anti-forgery system method based on mobile internet |
US20140297545A1 (en) * | 2012-09-12 | 2014-10-02 | Chachi Prasad | System and Method for Verifying and Communicating about OEM Products |
US20160012498A1 (en) * | 2012-09-12 | 2016-01-14 | Chachi Prasad | System and method for identifying, verifying and communicating about oem products using unique identifiers |
US9609022B2 (en) | 2014-12-10 | 2017-03-28 | Sybase, Inc. | Context based dynamically switching device configuration |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
US11288683B2 (en) * | 2014-11-06 | 2022-03-29 | Altria Client Services Llc | Methods and products for product tracing and authentication using conductive inks |
Citations (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5924072A (en) * | 1997-01-06 | 1999-07-13 | Electronic Data Systems Corporation | Knowledge management system and method |
US20010037206A1 (en) * | 2000-03-02 | 2001-11-01 | Vivonet, Inc. | Method and system for automatically generating questions and receiving customer feedback for each transaction |
US20010047290A1 (en) * | 2000-02-10 | 2001-11-29 | Petras Gregory J. | System for creating and maintaining a database of information utilizing user opinions |
US20020035501A1 (en) * | 1998-11-12 | 2002-03-21 | Sean Handel | A personalized product report |
US20020042756A1 (en) * | 2000-10-05 | 2002-04-11 | I2 Technologies, Us, Inc. | Fulfillment management system for managing ATP data in a distributed supply chain environment |
US20030085797A1 (en) * | 2001-11-06 | 2003-05-08 | Hongbiao Li | System and method for determining the authenticity of a product |
US20030187721A1 (en) * | 2002-04-01 | 2003-10-02 | Fumiharu Etoh | Method and apparatus for rating information management |
US20040088231A1 (en) * | 2002-01-04 | 2004-05-06 | Davis Tommy L. | System and method for tracking authenticated items |
US20040230528A1 (en) * | 2003-05-16 | 2004-11-18 | Fast Accurate Developments Limited | Network-based method and system for anti-counterfeiting merchandise authentication |
US20040230511A1 (en) * | 2001-12-20 | 2004-11-18 | Kannan Narasimhan P. | Global sales by referral network |
US20050044005A1 (en) * | 1999-10-14 | 2005-02-24 | Jarbridge, Inc. | Merging images for gifting |
US20050114270A1 (en) * | 2003-11-21 | 2005-05-26 | International Business Machines Corporation | Merchandise-integral transaction receipt and auditable product ownership trail |
US20050289061A1 (en) * | 2004-06-24 | 2005-12-29 | Michael Kulakowski | Secure authentication system for collectable and consumer items |
US20060010503A1 (en) * | 2003-02-19 | 2006-01-12 | Yoshiaki Inoue | Product authentication system for preventing distribution of counterfeits in market |
US20060032901A1 (en) * | 2004-08-12 | 2006-02-16 | Ntt Docomo, Inc. | Information providing method, information providing system and relay equipment |
US7065494B1 (en) * | 1999-06-25 | 2006-06-20 | Nicholas D. Evans | Electronic customer service and rating system and method |
US20060143452A1 (en) * | 2004-12-28 | 2006-06-29 | International Business Machines Corporation | Verifying the ownership of an owner's authority in terms of product and service |
US20060173896A1 (en) * | 2005-01-31 | 2006-08-03 | Geoff Lyon | Authentication method and system for distributing items |
US20060208860A1 (en) * | 2005-03-16 | 2006-09-21 | Samsung Electronics Co., Ltd. | Wireless terminal and RFID system for providing additional information and a method for providing additional information using wireless terminal and RFID system |
US20060218642A1 (en) * | 2005-03-22 | 2006-09-28 | Microsoft Corporation | Application identity and rating service |
US20060277075A1 (en) * | 2005-06-07 | 2006-12-07 | Salwan Angadbir S | Physician to patient network system for real-time electronic communications & transfer of patient health information |
US7231353B1 (en) * | 2000-07-13 | 2007-06-12 | Infoshop Llc | System and method for recording and reporting consumer monetary commentary |
US20070132549A1 (en) * | 2005-12-14 | 2007-06-14 | Fujitsu Limited | Method and device for verifying owner of article |
US20070179978A1 (en) * | 2005-11-14 | 2007-08-02 | Lee Kin K | Systems and methods for anti-counterfeit authentication |
US20070199988A1 (en) * | 2005-09-23 | 2007-08-30 | Labgold Marc R | Method and means for detection of counterfeit items and prevention of counterfeiting activities |
US20070214249A1 (en) * | 2006-03-13 | 2007-09-13 | Ebay Inc. | Peer-to-peer trading platform |
US20070234058A1 (en) * | 2005-11-04 | 2007-10-04 | White Charles A | System and method for authenticating products |
US20070291988A1 (en) * | 2005-03-18 | 2007-12-20 | Karimov Maxim R | Method and device for protecting products against counterfeiting |
US7322520B2 (en) * | 2005-04-12 | 2008-01-29 | Markem Corporation | Authentication of merchandise units |
US20080079535A1 (en) * | 2006-09-14 | 2008-04-03 | Userstar Information System Co., Ltd. | Method and system for verifying authenticity of an object |
US20080106372A1 (en) * | 2006-10-19 | 2008-05-08 | Wei Chang | Authentication method during product transactions |
US20080120119A1 (en) * | 2004-02-21 | 2008-05-22 | Cheol-Su Lee | Method for Servicing an Electronic Certificate for a Big-Name Brand |
US7383200B1 (en) * | 1997-05-05 | 2008-06-03 | Walker Digital, Llc | Method and apparatus for collecting and categorizing data at a terminal |
US20080129447A1 (en) * | 2006-12-04 | 2008-06-05 | Electronics And Telecommunications Research Institute | Electronic tag for protecting privacy and method of protecting privacy using the same |
US20080154699A1 (en) * | 2006-12-22 | 2008-06-26 | Fujitsu Limited | Evaluation information management method, evaluation information management system and medium storing evaluation information management program |
US20080195507A1 (en) * | 2007-01-01 | 2008-08-14 | Nitesh Ratnakar | Virtual Online Store |
US20080208753A1 (en) * | 2007-02-28 | 2008-08-28 | Dong Hoon Lee | Method and system for providing information on pre-purchase and post-purchase items using rfid and computer-readable storage media storing programs for executing the method |
US7492258B1 (en) * | 2006-03-21 | 2009-02-17 | Radiofy Llc | Systems and methods for RFID security |
US20090045911A1 (en) * | 2005-12-15 | 2009-02-19 | Frederic Bauchot | Use of radio frequency identifier (rfid) tags for identification of an authentication status of an item |
US20090089175A1 (en) * | 2007-10-02 | 2009-04-02 | Nir Platek | Product evaluation system and product evaluation method |
US20090106042A1 (en) * | 2006-11-27 | 2009-04-23 | Benjamin Maytal | System for product authentication by mobile phone |
US7552068B1 (en) * | 2000-03-02 | 2009-06-23 | Amazon Technologies, Inc. | Methods and systems of obtaining consumer reviews |
US7571121B2 (en) * | 1999-04-09 | 2009-08-04 | Amazon Technologies, Inc. | Computer services for identifying and exposing associations between user communities and items in a catalog |
US7630919B1 (en) * | 1996-07-25 | 2009-12-08 | Wells Obrecht | Method and apparatus for producing goods in an automated manner |
US20100013638A1 (en) * | 2008-07-17 | 2010-01-21 | Electronics And Telecommunications Research Institute | Apparatus and method for managing product distribution using security tag |
US7844482B1 (en) * | 2006-02-28 | 2010-11-30 | Intuit Inc. | Mechanism for collecting feedback from users |
US7895127B2 (en) * | 2006-09-29 | 2011-02-22 | Weiser Anatoly S | Rating-based sorting and displaying of reviews |
-
2007
- 2007-09-14 US US11/855,797 patent/US20090072946A1/en not_active Abandoned
Patent Citations (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7630919B1 (en) * | 1996-07-25 | 2009-12-08 | Wells Obrecht | Method and apparatus for producing goods in an automated manner |
US5924072A (en) * | 1997-01-06 | 1999-07-13 | Electronic Data Systems Corporation | Knowledge management system and method |
US7383200B1 (en) * | 1997-05-05 | 2008-06-03 | Walker Digital, Llc | Method and apparatus for collecting and categorizing data at a terminal |
US20020035501A1 (en) * | 1998-11-12 | 2002-03-21 | Sean Handel | A personalized product report |
US7571121B2 (en) * | 1999-04-09 | 2009-08-04 | Amazon Technologies, Inc. | Computer services for identifying and exposing associations between user communities and items in a catalog |
US7065494B1 (en) * | 1999-06-25 | 2006-06-20 | Nicholas D. Evans | Electronic customer service and rating system and method |
US20050044005A1 (en) * | 1999-10-14 | 2005-02-24 | Jarbridge, Inc. | Merging images for gifting |
US20010047290A1 (en) * | 2000-02-10 | 2001-11-29 | Petras Gregory J. | System for creating and maintaining a database of information utilizing user opinions |
US7552068B1 (en) * | 2000-03-02 | 2009-06-23 | Amazon Technologies, Inc. | Methods and systems of obtaining consumer reviews |
US20010037206A1 (en) * | 2000-03-02 | 2001-11-01 | Vivonet, Inc. | Method and system for automatically generating questions and receiving customer feedback for each transaction |
US7231353B1 (en) * | 2000-07-13 | 2007-06-12 | Infoshop Llc | System and method for recording and reporting consumer monetary commentary |
US20020042756A1 (en) * | 2000-10-05 | 2002-04-11 | I2 Technologies, Us, Inc. | Fulfillment management system for managing ATP data in a distributed supply chain environment |
US20030085797A1 (en) * | 2001-11-06 | 2003-05-08 | Hongbiao Li | System and method for determining the authenticity of a product |
US20040230511A1 (en) * | 2001-12-20 | 2004-11-18 | Kannan Narasimhan P. | Global sales by referral network |
US20040088231A1 (en) * | 2002-01-04 | 2004-05-06 | Davis Tommy L. | System and method for tracking authenticated items |
US20030187721A1 (en) * | 2002-04-01 | 2003-10-02 | Fumiharu Etoh | Method and apparatus for rating information management |
US20060010503A1 (en) * | 2003-02-19 | 2006-01-12 | Yoshiaki Inoue | Product authentication system for preventing distribution of counterfeits in market |
US20040230528A1 (en) * | 2003-05-16 | 2004-11-18 | Fast Accurate Developments Limited | Network-based method and system for anti-counterfeiting merchandise authentication |
US20050114270A1 (en) * | 2003-11-21 | 2005-05-26 | International Business Machines Corporation | Merchandise-integral transaction receipt and auditable product ownership trail |
US20080120119A1 (en) * | 2004-02-21 | 2008-05-22 | Cheol-Su Lee | Method for Servicing an Electronic Certificate for a Big-Name Brand |
US20050289061A1 (en) * | 2004-06-24 | 2005-12-29 | Michael Kulakowski | Secure authentication system for collectable and consumer items |
US20060032901A1 (en) * | 2004-08-12 | 2006-02-16 | Ntt Docomo, Inc. | Information providing method, information providing system and relay equipment |
US20060143452A1 (en) * | 2004-12-28 | 2006-06-29 | International Business Machines Corporation | Verifying the ownership of an owner's authority in terms of product and service |
US20060173896A1 (en) * | 2005-01-31 | 2006-08-03 | Geoff Lyon | Authentication method and system for distributing items |
US20060208860A1 (en) * | 2005-03-16 | 2006-09-21 | Samsung Electronics Co., Ltd. | Wireless terminal and RFID system for providing additional information and a method for providing additional information using wireless terminal and RFID system |
US20070291988A1 (en) * | 2005-03-18 | 2007-12-20 | Karimov Maxim R | Method and device for protecting products against counterfeiting |
US20060218642A1 (en) * | 2005-03-22 | 2006-09-28 | Microsoft Corporation | Application identity and rating service |
US7322520B2 (en) * | 2005-04-12 | 2008-01-29 | Markem Corporation | Authentication of merchandise units |
US20060277075A1 (en) * | 2005-06-07 | 2006-12-07 | Salwan Angadbir S | Physician to patient network system for real-time electronic communications & transfer of patient health information |
US20070199988A1 (en) * | 2005-09-23 | 2007-08-30 | Labgold Marc R | Method and means for detection of counterfeit items and prevention of counterfeiting activities |
US20070234058A1 (en) * | 2005-11-04 | 2007-10-04 | White Charles A | System and method for authenticating products |
US20070179978A1 (en) * | 2005-11-14 | 2007-08-02 | Lee Kin K | Systems and methods for anti-counterfeit authentication |
US20070132549A1 (en) * | 2005-12-14 | 2007-06-14 | Fujitsu Limited | Method and device for verifying owner of article |
US20090045911A1 (en) * | 2005-12-15 | 2009-02-19 | Frederic Bauchot | Use of radio frequency identifier (rfid) tags for identification of an authentication status of an item |
US7844482B1 (en) * | 2006-02-28 | 2010-11-30 | Intuit Inc. | Mechanism for collecting feedback from users |
US20070214249A1 (en) * | 2006-03-13 | 2007-09-13 | Ebay Inc. | Peer-to-peer trading platform |
US7492258B1 (en) * | 2006-03-21 | 2009-02-17 | Radiofy Llc | Systems and methods for RFID security |
US20080079535A1 (en) * | 2006-09-14 | 2008-04-03 | Userstar Information System Co., Ltd. | Method and system for verifying authenticity of an object |
US7895127B2 (en) * | 2006-09-29 | 2011-02-22 | Weiser Anatoly S | Rating-based sorting and displaying of reviews |
US20080106372A1 (en) * | 2006-10-19 | 2008-05-08 | Wei Chang | Authentication method during product transactions |
US20090106042A1 (en) * | 2006-11-27 | 2009-04-23 | Benjamin Maytal | System for product authentication by mobile phone |
US20090219132A1 (en) * | 2006-11-27 | 2009-09-03 | Benjamin Maytal | System for product authentication and tracking |
US20080129447A1 (en) * | 2006-12-04 | 2008-06-05 | Electronics And Telecommunications Research Institute | Electronic tag for protecting privacy and method of protecting privacy using the same |
US20080154699A1 (en) * | 2006-12-22 | 2008-06-26 | Fujitsu Limited | Evaluation information management method, evaluation information management system and medium storing evaluation information management program |
US20080195507A1 (en) * | 2007-01-01 | 2008-08-14 | Nitesh Ratnakar | Virtual Online Store |
US20080208753A1 (en) * | 2007-02-28 | 2008-08-28 | Dong Hoon Lee | Method and system for providing information on pre-purchase and post-purchase items using rfid and computer-readable storage media storing programs for executing the method |
US20090089175A1 (en) * | 2007-10-02 | 2009-04-02 | Nir Platek | Product evaluation system and product evaluation method |
US20100013638A1 (en) * | 2008-07-17 | 2010-01-21 | Electronics And Telecommunications Research Institute | Apparatus and method for managing product distribution using security tag |
Non-Patent Citations (1)
Title |
---|
Reseller Ratings Reviews: "Best Buy", pp 1-7, Jan 04, 2007 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100174661A1 (en) * | 2008-12-02 | 2010-07-08 | Qualcomm Incorporated | Wireless Branding |
US20100306112A1 (en) * | 2009-06-01 | 2010-12-02 | Userstar Information System Co., Ltd. | Online trading method and system with mechanism for verifying authenticity of a product |
US20130047232A1 (en) * | 2011-08-18 | 2013-02-21 | Teletech Holdings, Inc. | Multiple authentication mechanisms for accessing service center supporting a variety of products |
US8572707B2 (en) * | 2011-08-18 | 2013-10-29 | Teletech Holdings, Inc. | Multiple authentication mechanisms for accessing service center supporting a variety of products |
AU2012296429B2 (en) * | 2011-08-18 | 2015-07-09 | Teletech Holdings, Inc. | Multiple authentication mechanisms for accessing service center supporting a variety of products |
US9225716B2 (en) | 2011-08-18 | 2015-12-29 | Teletech Holdings, Inc. | Multiple authentication mechanisms for accessing service center supporting a variety of products |
US20140297545A1 (en) * | 2012-09-12 | 2014-10-02 | Chachi Prasad | System and Method for Verifying and Communicating about OEM Products |
US20160012498A1 (en) * | 2012-09-12 | 2016-01-14 | Chachi Prasad | System and method for identifying, verifying and communicating about oem products using unique identifiers |
CN104021475A (en) * | 2013-03-24 | 2014-09-03 | 张力 | Commodity cloud anti-forgery system method based on mobile internet |
US11288683B2 (en) * | 2014-11-06 | 2022-03-29 | Altria Client Services Llc | Methods and products for product tracing and authentication using conductive inks |
US9609022B2 (en) | 2014-12-10 | 2017-03-28 | Sybase, Inc. | Context based dynamically switching device configuration |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090072946A1 (en) | Collaborative product authentication | |
US10171460B2 (en) | Proximity-based system for automatic application or data access and item tracking | |
US8774462B2 (en) | System and method for associating an order with an object in a multiple lane environment | |
US8984596B2 (en) | Electronic device for displaying a plurality of web links based upon finger authentication and associated methods | |
CN104641362A (en) | Managing a fleet of electronic devices | |
JP2008059579A (en) | Rfid and its data management system | |
WO2018164839A1 (en) | Provisioning temporary functionality to user devices | |
US11295306B2 (en) | Systems and methods for location based account integration and electronic authentication | |
US20180130083A1 (en) | Systems and methods for identifying codes that may be redeemed for value | |
WO2013184191A2 (en) | In-library lending activation | |
EP3955143A1 (en) | Fraud deduction system, fraud deduction method, and program | |
US20220147966A1 (en) | Qr code initiative: checkout | |
CN108292419B (en) | Content providing method using first screen of portable communication terminal | |
US20230109673A1 (en) | Computing techniques to predict locations to obtain products utilizing machine-learning | |
US11657177B2 (en) | QR code initiative: privacy | |
US10068215B1 (en) | Support messages based on merchant account context | |
CN113297609A (en) | Method and device for monitoring privacy acquisition behaviors for small programs | |
CN112511632A (en) | Object pushing method, device and equipment based on multi-source data and storage medium | |
US20140172641A1 (en) | SYSTEMS AND METHODS FOR IDENTIFICATION AND/OR ACQUISITION OF A PRODUCT(s) OR ITEM(s) | |
US20220051270A1 (en) | Event analysis based on transaction data associated with a user | |
CN114330240A (en) | PDF document analysis method and device, computer equipment and storage medium | |
JP2008146470A (en) | Information extraction system and information extraction method | |
JP7089723B2 (en) | Sales support system | |
CN111461824A (en) | Interface display method, electronic device and computer readable storage medium | |
KR20140070910A (en) | Method of managing finalcial information, server performing the same and system performing the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SAP AG, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VON REISCHACH, FELIX GRAF;MICHAHELLES, FLORIAN;REEL/FRAME:020370/0156 Effective date: 20070912 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |